Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Unveiling scale: How hackers exploit generative AI to craft phishing scams

With the help of AI-driven tools, phishing scams can be executed on an unprecedented scale. We explore hackers’ intricate tactics, including how they impersonate trusted entities across industries and exploit vulnerabilities, as well as how machine learning can help spot the attacks bypassing our defences.

Vulnerabilities: Are we accidentally paving the way for cyber attacks?

We explore the evolving market for vulnerability trading and examine whether companies are potentially creating their own weaknesses. Learn what ESET discovered when they tested decommissioning processes, including what critical data from the previous owner was still accessible and open to abuse.

Why SIEM systems are your sticky SOCy pudding

SIEMs are powerful tools for detecting and responding to threats. Watch now as we explored why integration challenges persist, strategies to enhance the 'stickiness' of your SIEM, and case studies of how other organisations have tackled the challenge.

Mission Possible: Defusing an in-progress identity system attack

A security gap in your Active Directory could be enough to shut down your entire business operations. Watch now to learn how this happens, how a telco company recovered from this type of attack, and how you can respond effectively to an in-progress attack on your identity systems with step-by-step guidance.

The state of cybercrime: New year, new headaches

Watch now for a discussion on the latest high-profile breaches, including Okta’s stolen source code, the theft of 200M Twitter users’ data, a ransomware attack that crippled a Louisiana hospital, and the stolen LastPass password vaults. We also looked at how Meta is making good on the Cambridge Analytica leak.

Defending and attacking native on-premise Kubernetes orchestration system

Do you use Kubernetes (or any other open-source container orchestration system) to help automate your software deployment and management? Watch now to learn how using default deployment settings introduces attack vectors that would allow an attacker to compromise your organisation’s systems, and what to do instead.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.

Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue